A Model-Based Method for Security Configuration Verification

Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa. A Model-Based Method for Security Configuration Verification. In Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura, editors, Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Volume 4266 of Lecture Notes in Computer Science, pages 60-75, Springer, 2006. [doi]

@inproceedings{SakakiYO06,
  title = {A Model-Based Method for Security Configuration Verification},
  author = {Hiroshi Sakaki and Kazuo Yanoo and Ryuichi Ogawa},
  year = {2006},
  doi = {10.1007/11908739_5},
  url = {http://dx.doi.org/10.1007/11908739_5},
  tags = {rule-based, security},
  researchr = {https://researchr.org/publication/SakakiYO06},
  cites = {0},
  citedby = {0},
  pages = {60-75},
  booktitle = {Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings},
  editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin-ichi Kawamura},
  volume = {4266},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-47699-7},
}